Sciweavers

15 search results - page 3 / 3
» scam 2009
Sort
View
SCAM
2009
IEEE
15 years 10 months ago
Towards Comparing and Combining Points-to Analyses
Tobias Gutzmann, Antonina Khairova, Jonas Lundberg...
SCAM
2009
IEEE
15 years 10 months ago
Engineering Abstractions in Model Checking and Testing
ing Abstractions in Model Checking and Testing Michael Achenbach Klaus Ostermann
Michael Achenbach, Klaus Ostermann
105
Voted
PAM
2009
Springer
15 years 10 months ago
Dynamics of Online Scam Hosting Infrastructure
This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 350 distin...
Maria Konte, Nick Feamster, Jaeyeon Jung
SCAM
2009
IEEE
15 years 10 months ago
thr2csp: Toward Transforming Threads into Communicating Sequential Processes
—As multicore and heterogeneous multiprocessor platforms replace uniprocessor systems, software programs must be designed with a greater emphasis on concurrency. Threading has be...
Robert Charles Lange, Spiros Mancoridis
125
Voted
ICML
2009
IEEE
16 years 4 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...